Essays about: "CRYPTOLOGY"
Showing result 1 - 5 of 12 essays containing the word CRYPTOLOGY.
-
1. Models, Keys, and Cryptanalysis: Evaluating historical statistical language models in cryptanalysis of homophonic substitution ciphers
University essay from Göteborgs universitet/Institutionen för filosofi, lingvistik och vetenskapsteoriAbstract : This thesis presents an empirical study connected to historical cryptography and especially within the framework of the research project DECRYPT. One of the research questions in the DECRYPT project relates to the use of language models for automatic cryptanalysis. READ MORE
-
2. Evaluating and Fine-Tuning a Few-Shot Model for Transcription of Historical Ciphers
University essay from Uppsala universitet/Institutionen för lingvistik och filologiAbstract : Thousands of historical ciphers, encrypted manuscripts, are stored in archives across Europe. Historical cryptology is the research field concerned with studying these manuscripts - combining the interest of humanistic fields with methods of cryptography and computational linguistics. READ MORE
-
3. Privacy Preserving Biometric Multi-factor Authentication
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : This thesis investigates the viability of using Fully Homomorphic Encryption and Machine Learning to construct a privacy-preserving biometric multi-factor authentication system. The system is based on the architecture described as ”Model K - Store distributed, compare distributed” in ISO/IEC 24745:2022 and uses the Torus Fully Homomorphic Encryption scheme proposed by Chillotti et al. READ MORE
-
4. The Influence of Language Models on Decryption of German Historical Ciphers
University essay from Uppsala universitet/Institutionen för lingvistik och filologiAbstract : This thesis assesses the influence of language models on decryption of historical German ciphers. Previous research on language identification and cleartext detection indicates that it is beneficial to use historical language models (LM) while dealing with historical ciphers as they can outperform models trained on present-day data. READ MORE
-
5. Implementing two Threshold Private Set Intersection Protocols based on Homomorphic Encryption
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Private set intersection is a technique for finding the intersection of (two) parties' sets without disclosing anything else, and it finds it use in e.g. contact discovery, finding friends who are already on a social platform. READ MORE